Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 08:58

General

  • Target

    5883b056534337cabeee2c58cdde6ccc.exe

  • Size

    219KB

  • MD5

    5883b056534337cabeee2c58cdde6ccc

  • SHA1

    b6fe9b5f759619eb2dde2104df00fd70fbb68791

  • SHA256

    3fcf39c1217361c05077b8bd1b5f9e0bdc922d908ed291f88d1b6d4094d0dcc2

  • SHA512

    ecdb2c49df743d5484f1b9f4a3fe6897e42d0f81d8e234210be73d8d51a5f99024ba29c455424b80c0c8a2e4bfae349e4538c7fb522268273af7fb283724eb12

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8oveaMpjBFyT:o68i3odBiTl2+TCU/+verhuhuIp1

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5883b056534337cabeee2c58cdde6ccc.exe
    "C:\Users\Admin\AppData\Local\Temp\5883b056534337cabeee2c58cdde6ccc.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\bugMAKER.bat
      2⤵
        PID:2900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\bugMAKER.bat

      Filesize

      76B

      MD5

      842f05e380d7f62191eba6a2a6d58bb4

      SHA1

      4bee14507b2b23925baa651ab43ada6299a57827

      SHA256

      78c81508536db1fd3e4ffd771e9ce67c223076ef31491001f61ba2857eb05e53

      SHA512

      be6623b1ae63c728f09c09b9f5bdc3958177bd96562d2ca3871d4f105e8f630313741a250d04574775b8f20fe7b20691a019e12fab62493e2d75590018b01e07

    • memory/1116-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2900-62-0x00000000021C0000-0x00000000021C1000-memory.dmp

      Filesize

      4KB